会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Server initiated secure network connection
    • 服务器启动安全网络连接
    • US08769129B2
    • 2014-07-01
    • US11939839
    • 2007-11-14
    • Kent A. WatsenSimon J. GerratyPaul FraleyPhilip A. ShaferDarren Tom
    • Kent A. WatsenSimon J. GerratyPaul FraleyPhilip A. ShaferDarren Tom
    • G06F15/16
    • H04L69/16H04L63/029H04L63/166H04L69/163
    • In general, the invention is directed to techniques for establishing secure connections with devices residing behind a security device. In accordance with the techniques, a managed device initiates a transmission control protocol (TCP) session to establish a TCP session with a management device such that the management device acts as the TCP server and the managed device acts as a TCP client. Once established, the managed device sends a role reversal message specifying an identity of the managed device via the TCP session. Upon receiving the role reversal message, the management device initiates a secure connection over the TCP session in accordance with a secure protocol such that the management device acts as the secure protocol client and the managed device acts as the secure protocol server. By properly establishing the secure session, each of the devices assumes the proper roles and administrators may more easily configure the devices.
    • 通常,本发明涉及用于与驻留在安全设备后面的设备建立安全连接的技术。 根据这些技术,被管理设备启动传输控制协议(TCP)会话以与管理设备建立TCP会话,使得管理设备充当TCP服务器,被管理设备充当TCP客户端。 一旦建立,被管理设备通过TCP会话发送指定被管理设备的身份的角色反转消息。 在接收到角色反转消息时,管理设备根据安全协议通过TCP会话发起安全连接,使得管理设备充当安全协议客户端,被管理设备充当安全协议服务器。 通过适当地建立安全会话,每个设备都承担正确的角色,管理员可以更容易地配置设备。
    • 2. 发明申请
    • SERVER INITIATED SECURE NETWORK CONNECTION
    • 服务器启动安全网络连接
    • US20090125633A1
    • 2009-05-14
    • US11939839
    • 2007-11-14
    • Kent A. WatsenSimon J. GerratyPaul FraleyPhilip A. ShaferDarren Tom
    • Kent A. WatsenSimon J. GerratyPaul FraleyPhilip A. ShaferDarren Tom
    • G06F15/16
    • H04L69/16H04L63/029H04L63/166H04L69/163
    • In general, the invention is directed to techniques for establishing secure connections with devices residing behind a security device. In accordance with the techniques, a managed device initiates a transmission control protocol (TCP) session to establish a TCP session with a management device such that the management device acts as the TCP server and the managed device acts as a TCP client. Once established, the managed device sends a role reversal message specifying an identity of the managed device via the TCP session. Upon receiving the role reversal message, the management device initiates a secure connection over the TCP session in accordance with a secure protocol such that the management device acts as the secure protocol client and the managed device acts as the secure protocol server. By properly establishing the secure session, each of the devices assumes the proper roles and administrators may more easily configure the devices.
    • 通常,本发明涉及用于与驻留在安全设备后面的设备建立安全连接的技术。 根据这些技术,被管理设备启动传输控制协议(TCP)会话以与管理设备建立TCP会话,使得管理设备充当TCP服务器,被管理设备充当TCP客户端。 一旦建立,被管理设备通过TCP会话发送指定被管理设备的身份的角色反转消息。 在接收到角色反转消息时,管理设备根据安全协议通过TCP会话发起安全连接,使得管理设备充当安全协议客户端,被管理设备充当安全协议服务器。 通过适当地建立安全会话,每个设备都承担正确的角色,管理员可以更容易地配置设备。
    • 3. 发明授权
    • Rescue configuration
    • 救援配置
    • US08412803B1
    • 2013-04-02
    • US10666352
    • 2003-09-19
    • Paul Fraley
    • Paul Fraley
    • G06F15/177
    • H04L45/563
    • A configuration is identified as a rescue configuration. The identified rescue configuration is stored in a storage device (if it is not already stored). The stored rescue configuration may then be used to configure an apparatus, such as a router, in response to a rescue command. Identifying a particular configuration as a rescue configuration can be done by a manual command. The identifying may be limited such that it is effected only if performed by an authorized user. Alternatively, the identification of a configuration as the rescue configuration can be done automatically. For example, an automatic rollback to a known functioning configuration can occur automatically (e.g., in response to a rescue command). A configuration may be determined to be the known functioning configuration using various factors.
    • 配置被识别为救援配置。 识别的救援配置存储在存储设备中(如果尚未存储)。 然后可以使用所存储的救援配置来响应于救援命令来配置诸如路由器的装置。 识别作为救援配置的特定配置可以通过手动命令来完成。 可以限制识别,使得仅当由授权用户执行时才能进行识别。 或者,可以自动地进行作为救援配置的配置的识别。 例如,自动回滚到已知功能配置可以自动发生(例如,响应于救援命令)。 可以使用各种因素将配置确定为已知的功能配置。